supabase-automation

Fail

Audited by Snyk on Apr 13, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The prompt includes multiple examples that embed real-looking secrets verbatim (inline supabase secrets set commands, .env files with JWTs/passwords, DATABASE_URL with plaintext password, and example API keys like sk-.../sk_live_...), which would push an LLM to handle or reproduce secret values directly.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill's required MCP integration (explicit "MCP Connection URL" and the "Setup MCP Server" steps pointing to https://mcp.supabase.com/mcp in SKILL.md) instructs the agent to connect to a public Supabase MCP endpoint that exposes docs, account/database/debugging logs and storage (potentially user-generated) which the agent is expected to read and act on as part of workflows, so untrusted third‑party content could influence actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
HIGH
Analyzed
Apr 13, 2026, 04:20 PM
Issues
3